cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1601
Views
0
Helpful
4
Replies

Cannot Access Internal LAN through Remote Access VPN: Cisco ASA 5515-X

chs_santhu
Level 1
Level 1

Hi Everyone

I am struggling with this since last 10 days and don't have any clue where it is going wrong. Hoping someone could help me in configuring it.

We have Cisco ASA - 5515-X running and recently I have enabled the Remote Access VPN with the below configuration.

I am able to connect successfully and also able to ping the vpn ( which is inside) interface but cannot ping or reach the rest of the network/hosts in the LAN. I have also tried with different VPNClient Pools ( For e.g. 192.168.x.x) but ended up same.

The localhosts I am trying to ping from VPN client are reachable from ASA so not sure if it is a routing issue.

 

Am I missing something here?

=====================================================================================

: Saved
:
: Hardware:   ASA5515, 8192 MB RAM, CPU Clarkdale 3059 MHz, 1 CPU (4 cores)
:
ASA Version 9.2(2)8
!
hostname asa
domain-name dc.example.com
enable password 07tqp.CdgjzuHukL encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
passwd 5F.543RuZ7rxXSzi encrypted
names
ip local pool VPNClient 10.16.254.67-10.16.254.126 mask 255.255.255.0
!
interface GigabitEthernet0/0
 channel-group 1 mode active
 no nameif

no security-level
 no ip address
!
interface GigabitEthernet0/1
 channel-group 1 mode active
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/2
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/4
 shutdown
 no nameif

no security-level
 no ip address
!
interface GigabitEthernet0/5
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management0/0
 management-only
 nameif management
 security-level 100
 ip address 10.16.0.23 255.255.255.0
!
interface Port-channel1
 lacp max-bundle 8
 no nameif
 no security-level
 no ip address
!
interface Port-channel1.2001
 vlan 2001
 nameif out

security-level 0
 ip address xx.xx.xx.202 255.255.255.252
 ospf cost 20
 ospf priority 10
 ospf hello-interval 1
!
interface Port-channel1.2011
 vlan 2011
 nameif vpn
 security-level 100
 ip address 10.16.254.66 255.255.255.192
 ospf cost 11
 ospf hello-interval 1
!
interface Port-channel1.2012
 vlan 2012
 nameif dmz
 security-level 25
 ip address xx.xx.xx.205 255.255.255.252
 ospf cost 21
 ospf hello-interval 1
!
boot system disk0:/asa922-8-smp-k8.bin
ftp mode passive

dns domain-lookup vpn
dns server-group DefaultDNS
 name-server 10.17.0.67
 name-server 10.17.0.68
 domain-name dc.example.com
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface

object network inside_nw
 subnet 10.0.0.0 255.0.0.0
object network vpn_local
 subnet 10.16.254.64 255.255.255.192

object-group icmp-type DM_INLINE_ICMP_1
 icmp-object echo
 icmp-object time-

access-list vpn_access_in extended permit ip any4 any4
access-list vpn_access_in extended permit ip any any
access-list out_access_in extended deny udp any any eq ntp
access-list out_access_in extended permit ip any4 any4
access-list out_access_in extended permit ip any any log
access-list out_access_in extended permit icmp any4 any object-group DM_INLINE_ICMP_1
access-list DefaultRAGroup_splitTunnelAcl standard permit 10.0.0.0 255.0.0.0
access-list vpn_traffic standard permit 10.16.254.0 255.255.255.0
access-list dmz_access_in extended permit ip any any
access-list crypto_map_acl extended permit ip any object inside_nw

mtu management 1500
mtu out 1500
mtu vpn 1500
mtu dmz 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-731-101.bin

arp timeout 14400
no arp permit-nonconnected
nat (vpn,out) source static inside_nw inside_nw destination static inside_nw inside_nw route-lookup
access-group out_access_in in interface out
access-group vpn_access_in in interface vpn
access-group dmz_access_in in interface dmz

router ospf 1
 router-id 0.0.1.3
 network 10.16.254.64 255.255.255.192 area 0
 network xx.xx.xx.200 255.255.255.252 area 0
 network xx.xx.xx.204 255.255.255.252 area 0
 area 0

route vpn 10.0.0.0 255.0.0.0 10.16.254.65 1

sysopt connection tcpmss 1300
sysopt noproxyarp out
sysopt noproxyarp vpn

crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport

crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map out_dyn_map 65535 set ikev1 transform-set ESP-AES-256-SHA-TRANS ESP-AES-256-SHA ESP-3DES-SHA-TRANS ESP-3DES-SHA
crypto dynamic-map out_dyn_map 65535 set reverse-route

crypto ca trustpool policy
crypto ikev1 enable out
crypto ikev1 policy 10
 authentication crack
 encryption aes-256
 hash sha
 group 2
 lifetime 86400

management-access vpn
no threat-detection basic-threat
no threat-detection statistics access-list
no threat-detection statistics tcp-intercept

group-policy DefaultRAGroup internal
group-policy DefaultRAGroup attributes
 vpn-tunnel-protocol l2tp-ipsec ssl-client
group-policy GroupPolicyRAX internal
group-policy GroupPolicyRAX attributes
 dns-server value 10.17.0.67 10.17.0.68
 vpn-tunnel-protocol ikev1 l2tp-ipsec
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl
 default-domain value dc.example.com

 

tunnel-group DefaultRAGroup general-attributes
 address-pool VPNClient
 authentication-server-group LDAPX
 default-group-policy GroupPolicyRAX
tunnel-group DefaultRAGroup ipsec-attributes
 ikev1 pre-shared-key *****
tunnel-group DefaultRAGroup ppp-attributes
 authentication pap
 no authentication chap
 no authentication ms-chap-v1

class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny  
  inspect sunrpc
  inspect xdmcp
  inspect sip  
  inspect netbios
  inspect tftp
  inspect ip-options
  inspect icmp
  inspect http
  inspect pptp
  inspect icmp error
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:d0fd790b4e98e246f3059fcea8023e69
: end

4 Replies 4

chs_santhu
Level 1
Level 1

I am concerned that when I try to reach any internal host through VPN : decaps are being increased but encap is zero always.

 

# sh crypto ipsec sa
interface: out
    Crypto map tag: out_dyn_map, seq num: 65535, local addr: xx.xx.xx.202

      local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
      remote ident (addr/mask/prot/port): (10.16.254.67/255.255.255.255/0/0)
      dynamic allocated peer ip: 10.16.254.67
      dynamic allocated peer ip(ipv6): 0.0.0.0

      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
      #pkts decaps: 4, #pkts decrypt: 4, #pkts verify: 4
      #pkts compressed: 0, #pkts decompressed: 0
      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0
      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
      #TFC rcvd: 0, #TFC sent: 0
      #Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0
      #send errors: 0, #recv errors: 0

 

Also dropped packets

 

# sh asp drop frame
  Flow is denied by configured rule (acl-drop)                                33
  FP L2 rule drop (l2_acl)                                                  3318
  Interface is down (interface-down)                                           4

Last clearing: Never

 

Anyone please ?

Hi, did anyone find a solution for this?

I am having the same issue on the same ASA model.
 

Good document , you might find your solution in this one :

http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/81824-common-ipsec-trouble.html?referring_site=RE&pos=1&page=http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/5409-ipsec-debug-00.html